Filter interviews by
I applied via Company Website and was interviewed in Apr 2021. There was 1 interview round.
I am a recent graduate with a degree in Computer Science and a passion for coding and problem-solving.
Graduated with a degree in Computer Science
Passionate about coding and problem-solving
Completed internships at tech companies
Proficient in programming languages like Java, Python, and JavaScript
I applied via Recruitment Consulltant and was interviewed in Dec 2023. There was 1 interview round.
NITI Aayog interview questions for popular designations
I appeared for an interview before Jan 2024.
I applied via Company Website and was interviewed before Jan 2022. There were 2 interview rounds.
My top three research area preferences are machine learning, natural language processing, and computer vision.
I am interested in exploring the applications of machine learning in various fields such as healthcare, finance, and social media.
I want to investigate the use of natural language processing in sentiment analysis, text classification, and language translation.
I am intrigued by the possibilities of computer visi...
I applied via Internshala and was interviewed before Jun 2022. There were 4 interview rounds.
Quality Council of India is a government body established to promote and sustain quality in all spheres of economic and social life.
Established in 1997 by the Government of India
Operates under the Ministry of Commerce and Industry
Promotes quality standards and certifications across various sectors
Provides training and consultancy services to improve quality management practices
Works with organizations to enhance their
Ppt Wireframing workflow and decision making
I applied via Referral and was interviewed in Aug 2023. There was 1 interview round.
Types of cyber attacks include malware, phishing, ransomware, DDoS attacks, and social engineering.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: malware that encrypts a user's files and demands payment for their release.
DDoS attacks: flooding a network or serv...
To mitigate MITM attacks, use encryption, implement secure communication protocols, and verify server certificates.
Use encryption to protect data in transit
Implement secure communication protocols like HTTPS
Verify server certificates to ensure the authenticity of the server
Use VPNs for secure remote access
Develop a Remote Access Trojan (RAT) using Metasploit Framework (MSF)
Use Metasploit Framework to create a payload for the RAT
Set up a listener to receive connections from the compromised machines
Utilize post-exploitation modules in MSF for advanced functionality
Ensure proper evasion techniques to avoid detection by antivirus software
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
Example: When you send an email, t...
posted on 19 Jan 2025
Reverse the string, Reverse of an array, Data base related queries
based on 5 interviews
Interview experience
based on 50 reviews
Rating in categories
Young Professional
68
salaries
| ₹7.2 L/yr - ₹9.2 L/yr |
Consultant
30
salaries
| ₹6.6 L/yr - ₹20 L/yr |
Office Assistant
11
salaries
| ₹2.6 L/yr - ₹4 L/yr |
Senior Office Assistant
10
salaries
| ₹3 L/yr - ₹4.5 L/yr |
Intern
7
salaries
| ₹1 L/yr - ₹8.4 L/yr |
Government of India
National Informatics Centre
Central Reserve Police Force
Ministry of Defence